Chromium Code Reviews| Index: content/browser/security_exploit_browsertest.cc |
| diff --git a/content/browser/security_exploit_browsertest.cc b/content/browser/security_exploit_browsertest.cc |
| index 086d801fe4dce063bd25d0347a4180c1eaec51a7..51226052cf91b8b78011ed39c482b6dfca0e0414 100644 |
| --- a/content/browser/security_exploit_browsertest.cc |
| +++ b/content/browser/security_exploit_browsertest.cc |
| @@ -8,15 +8,19 @@ |
| #include "content/browser/dom_storage/dom_storage_context_wrapper.h" |
| #include "content/browser/dom_storage/session_storage_namespace_impl.h" |
| #include "content/browser/frame_host/navigator.h" |
| +#include "content/browser/frame_host/render_frame_host_impl.h" |
| #include "content/browser/renderer_host/render_view_host_factory.h" |
| #include "content/browser/renderer_host/render_view_host_impl.h" |
| #include "content/browser/web_contents/web_contents_impl.h" |
| #include "content/common/frame_messages.h" |
| +#include "content/common/resource_messages.h" |
| #include "content/common/view_messages.h" |
| #include "content/public/browser/browser_context.h" |
| +#include "content/public/browser/content_browser_client.h" |
| #include "content/public/browser/interstitial_page.h" |
| #include "content/public/browser/interstitial_page_delegate.h" |
| #include "content/public/browser/storage_partition.h" |
| +#include "content/public/common/appcache_info.h" |
| #include "content/public/common/content_switches.h" |
| #include "content/public/common/file_chooser_params.h" |
| #include "content/public/test/browser_test_utils.h" |
| @@ -24,6 +28,7 @@ |
| #include "content/public/test/content_browser_test_utils.h" |
| #include "content/public/test/test_utils.h" |
| #include "content/shell/browser/shell.h" |
| +#include "content/test/test_content_browser_client.h" |
| #include "ipc/ipc_security_test_util.h" |
| #include "net/dns/mock_host_resolver.h" |
| #include "net/test/embedded_test_server/embedded_test_server.h" |
| @@ -91,6 +96,28 @@ RenderViewHostImpl* PrepareToDuplicateHosts(Shell* shell, |
| return next_rfh->render_view_host(); |
| } |
| +ResourceHostMsg_Request CreateXHRRequestWithOrigin(const char* origin) { |
| + ResourceHostMsg_Request request; |
| + request.method = "GET"; |
| + request.url = GURL("http://bar.com/simple_page.html"); |
| + request.first_party_for_cookies = GURL(origin); |
| + request.referrer_policy = blink::WebReferrerPolicyDefault; |
| + request.headers = base::StringPrintf("Origin: %s\r\n", origin); |
| + request.load_flags = 0; |
| + request.origin_pid = 0; |
| + request.resource_type = RESOURCE_TYPE_XHR; |
| + request.request_context = 0; |
| + request.appcache_host_id = kAppCacheNoHostId; |
| + request.download_to_file = false; |
| + request.should_reset_appcache = false; |
| + request.is_main_frame = true; |
| + request.parent_is_main_frame = false; |
| + request.parent_render_frame_id = -1; |
|
nasko
2015/08/14 22:14:43
MSG_ROUTING_NONE?
Charlie Reis
2015/08/14 23:23:32
The docs say to use -1:
https://code.google.com/p/
nasko
2015/08/14 23:36:41
Acknowledged.
|
| + request.transition_type = ui::PAGE_TRANSITION_LINK; |
| + request.allow_download = true; |
| + return request; |
| +} |
| + |
| } // namespace |
| @@ -128,11 +155,11 @@ void SecurityExploitBrowserTest::TestFileChooserWithPath( |
| NavigateToURL(shell(), foo); |
| EXPECT_EQ(base::ASCIIToUTF16("OK"), shell()->web_contents()->GetTitle()); |
| - content::RenderViewHost* compromised_renderer = |
| + RenderViewHost* compromised_renderer = |
| shell()->web_contents()->GetRenderViewHost(); |
| - content::RenderProcessHostWatcher terminated( |
| + RenderProcessHostWatcher terminated( |
| shell()->web_contents(), |
| - content::RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| + RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| FileChooserParams params; |
| params.default_file_name = path; |
| @@ -154,9 +181,9 @@ IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, SetWebUIProperty) { |
| EXPECT_EQ(0, |
| shell()->web_contents()->GetRenderViewHost()->GetEnabledBindings()); |
| - content::RenderProcessHostWatcher terminated( |
| + RenderProcessHostWatcher terminated( |
| shell()->web_contents(), |
| - content::RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| + RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| shell()->web_contents()->GetRenderViewHost()->SetWebUIProperty( |
| "toolkit", "views"); |
| terminated.Wait(); |
| @@ -281,7 +308,7 @@ IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, |
| new SecurityExploitTestInterstitialPage(shell()->web_contents()); |
| ASSERT_EQ("", interstitial->last_command()); |
| - content::WaitForInterstitialAttach(shell()->web_contents()); |
| + WaitForInterstitialAttach(shell()->web_contents()); |
| InterstitialPage* interstitial_page = |
| shell()->web_contents()->GetInterstitialPage(); |
| @@ -298,7 +325,7 @@ IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, |
| // Send an automation message from the underlying content and wait for it to |
| // be dispatched on this thread. This message should not be received by the |
| // interstitial. |
| - content::RenderFrameHost* compromised_renderer = |
| + RenderFrameHost* compromised_renderer = |
| shell()->web_contents()->GetMainFrame(); |
| FrameHostMsg_DomOperationResponse evil(compromised_renderer->GetRoutingID(), |
| "evil", MSG_ROUTING_NONE); |
| @@ -313,12 +340,95 @@ IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, |
| // Send a second message from the interstitial page, and make sure that the |
| // "evil" message doesn't arrive in the intervening period. |
| - ASSERT_TRUE(content::ExecuteScript( |
| - interstitial_page->GetMainFrame(), |
| - "window.domAutomationController.send(\"okay2\");")); |
| + ASSERT_TRUE(ExecuteScript(interstitial_page->GetMainFrame(), |
| + "window.domAutomationController.send(\"okay2\");")); |
| ASSERT_TRUE(message_queue.WaitForMessage(&message)); |
| ASSERT_EQ("\"okay2\"", message); |
| ASSERT_EQ("\"okay2\"", interstitial->last_command()); |
| } |
| +class IsolatedAppContentBrowserClient : public TestContentBrowserClient { |
| + public: |
| + bool IsIllegalOrigin(content::ResourceContext* resource_context, |
|
Charlie Reis
2015/08/14 20:25:59
I wanted to test this in chrome/ with an actual ap
|
| + int child_process_id, |
| + const GURL& origin) override { |
| + // Simulate a case where an app origin is not in an app process. |
| + return true; |
| + } |
| +}; |
| + |
| +// Renderer processes should not be able to spoof Origin HTTP headers. |
| +IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, InvalidOriginHeaders) { |
| + // Create a set of IPC messages with various Origin headers. |
| + ResourceHostMsg_Request chrome_origin_msg( |
| + CreateXHRRequestWithOrigin("chrome://settings")); |
| + ResourceHostMsg_Request embedder_isolated_origin_msg( |
| + CreateXHRRequestWithOrigin("https://isolated.bar.com")); |
| + ResourceHostMsg_Request invalid_origin_msg( |
| + CreateXHRRequestWithOrigin("invalidurl")); |
| + ResourceHostMsg_Request invalid_scheme_origin_msg( |
| + CreateXHRRequestWithOrigin("fake-scheme://foo")); |
| + |
|
nasko
2015/08/14 22:14:43
Shouldn't a test case exist for chrome-extension:/
Charlie Reis
2015/08/14 23:23:32
Sadly I can't, since chrome-extension:// doesn't e
nasko
2015/08/14 23:36:41
Might be useful to put that/similar comment in the
Charlie Reis
2015/08/17 18:32:21
Done.
|
| + GURL web_url("http://foo.com/simple_page.html"); |
| + NavigateToURL(shell(), web_url); |
| + RenderFrameHost* web_rfh = shell()->web_contents()->GetMainFrame(); |
| + |
| + // Web processes cannot make XHRs with chrome:// Origin headers. |
| + { |
| + RenderProcessHostWatcher web_process_killed( |
| + web_rfh->GetProcess(), |
| + RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| + IPC::IpcSecurityTestUtil::PwnMessageReceived( |
| + web_rfh->GetProcess()->GetChannel(), |
| + ResourceHostMsg_RequestResource(web_rfh->GetRoutingID(), 1, |
| + chrome_origin_msg)); |
| + web_process_killed.Wait(); |
| + } |
| + |
| + // Web processes cannot make XHRs with URLs that the content embedder expects |
| + // to have process isolation. |
| + NavigateToURL(shell(), web_url); |
| + { |
| + // Set up a ContentBrowserClient that simulates an app URL in a non-app |
| + // process. |
| + IsolatedAppContentBrowserClient app_client; |
| + ContentBrowserClient* old_client = SetBrowserClientForTesting(&app_client); |
| + RenderProcessHostWatcher web_process_killed( |
| + web_rfh->GetProcess(), |
| + RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| + IPC::IpcSecurityTestUtil::PwnMessageReceived( |
| + web_rfh->GetProcess()->GetChannel(), |
| + ResourceHostMsg_RequestResource(web_rfh->GetRoutingID(), 1, |
| + embedder_isolated_origin_msg)); |
| + web_process_killed.Wait(); |
| + SetBrowserClientForTesting(old_client); |
| + } |
| + |
| + // Web processes cannot make XHRs with invalid Origin headers. |
| + NavigateToURL(shell(), web_url); |
| + { |
| + RenderProcessHostWatcher web_process_killed( |
| + web_rfh->GetProcess(), |
| + RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| + IPC::IpcSecurityTestUtil::PwnMessageReceived( |
| + web_rfh->GetProcess()->GetChannel(), |
| + ResourceHostMsg_RequestResource(web_rfh->GetRoutingID(), 1, |
| + invalid_origin_msg)); |
| + web_process_killed.Wait(); |
| + } |
| + |
| + // Web processes cannot make XHRs with invalid scheme Origin headers. |
| + NavigateToURL(shell(), web_url); |
| + { |
| + RenderProcessHostWatcher web_process_killed( |
| + web_rfh->GetProcess(), |
| + RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| + IPC::IpcSecurityTestUtil::PwnMessageReceived( |
| + web_rfh->GetProcess()->GetChannel(), |
| + ResourceHostMsg_RequestResource(web_rfh->GetRoutingID(), 1, |
| + invalid_scheme_origin_msg)); |
| + web_process_killed.Wait(); |
| + } |
| +} |
| + |
| } // namespace content |